564 words - 3 pages
Identity theft is one of the fastest growing crimes in the United States. Every minute about nine people have their identity stolen. (Identity Theft and Identity Fraud, 2013). Identity theft can happen to anyone at any time. A consumer can protect themselves without having to purchase a protection program. Protection programs are available to help consumers protect their identity. An identity theft program isn’t the best protection against identity theft.
There are a number of protection plan companies a consumer can choose from. Each company has their own plans to choose from and each have different rates. A consumer can review the ratings of each company also. When a
479 words - 2 pages
Lab 10: Identity Theft
Identity theft is on the rise every day and we do not even know when it happens. Identity theft occurs when someone wrongfully obtains another’s personal information without their knowledge to commit theft or fraud (Federal Bureau of Investigation, n.d.). Identity theft crimes include credit card fraud, internet fraud, mail fraud, and many others. Anybody is at risk of identity theft; nobody is safe. As beginning IT students, it is important to learn the basic way to protect ourselves right now. Working on the Internet exposes your identity to many people.
When a person uses your information without your consent and causes any type of harm is considered identity
1950 words - 8 pages
Identity theft refers to a situation where a person uses information used to identify another person, such as their name, credit card number or social security number without their permission, in order to commit fraud or other crimes. In other words, it is stealing the identity of a certain person and pretending to be that person by assuming their identity, usually so as to access their resources or to obtain recognition and other profits in their name (Cheney, 2005).
There are many forms of crime related to identity theft. Some identity thieves rent apartments or get credit cards
1432 words - 6 pages
Ever wonder what it would be like to live in a place where it was safe to leave the doors unlocked, to walk down the street alone, or to trust everyone that enters your house? These days personal information can be found in a person’s car, purse, or home; and can even be stolen by the least expected person. While there are preventative measures that can be taken, identity theft is a serious crime that is conducted in many ways and has caused large amounts of damage for many individuals.
Many people welcome family and friends into their home and never consider the possibility that they would steal person information. The truth is, the closer someone is to
1005 words - 5 pages
information and tools identity theft on the internet would not be as large of a problem that it has grown into today.
Phishing is the newest type of internet theft and could be the most dangerous!
1% to 20% of those attacked by Phishing scams become victims. Phishers uses fraudulent E-mails and web sites that are so close to the real thing that many consumers are fooled by the copied images, links and texts that are often from the legitimate web site that the consumer thinks they are visiting. The Phishers are after your personal information; usernames, passwords, credit card numbers, home addresses, social security number, pretty much anything that can help open false
1963 words - 8 pages
Avoiding Identity Theft
Avoiding Identity Theft
Ben Franklin once said “An ounce of prevention is worth a pound of cure” Well this has never been truer than in today’s hi-tech society where our personal information flows freely over the internet. Identity theft has become a wide-spread crime committed by thieves who use stolen personal information to commit various types of fraud. Simply put, identity theft is a crime that takes your personal information and uses it to open unauthorized accounts, make purchases and acquire loans without the victim’s knowledge. So in order to protect against identity theft citizens
946 words - 4 pages
In today’s information age we store our information various ways from hard copies, to storing our information on our computers and servers. Our most personal information: Date of Birth, Social Security Numbers, is stored by various companies, organizations, and the Federal Government. So in 1974 the United States realized it was storing lots of personal information on its citizens and enacted the privacy act of 1974, in which it states that “no agency will disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the
580 words - 3 pages
Running Head: The Eruption of Identity Theft
The Eruption of Identity Theft
Thomas J. Moore
Saint Petersburg College, Tarpon Springs
CJE1669 - Identity Theft Investigations (Online) Thomas
The idea of identity theft is nothing new; it has been around for centuries in one form or another. I would say that Martin Biegelman defines identity theft in a way in which we can all understand, he says that identity theft is the seizure of a person’s private information to mimic that person in a legal sense.
So many people are
1299 words - 6 pages
Identity theft is one of the fastest growing crimes in the United States. From empty bank accounts to ruined credit reports, there are numerous ways that an identity thief could hurt you. While identity theft is not new, the advent of the internet has given thieves new ways of using your personal data as their own for their benefit. According to Javelin Strategy and Research (2014), in 2013, over l3 million people were victims of some type of identity fraud. This showed an increase of more than half of a million people becoming victims. Considering the fact that more and more of our lives involve the internet through social media, online banking, and online shopping, it is up to us to
788 words - 4 pages
Student and Non-Student Awareness of Identity Theft
This article was written by John Winterdyk and Nikki Thompson for the Canadian Journal of Criminology and Criminal Justice. It is titled “Student and non-student awareness of identity theft,” and encompasses the rising concern of identity theft. The article, subsequently, continues to reveal the increasing number of identity fraud cases throughout the United States and Canada over the last decade, with particular focus on the susceptibility of young adults. Moreover, it measures the awareness about the nature, extent, risk and effects of identity theft and a variety of fraudulent behaviors among university students and non-students
452 words - 2 pages
NT1110 Research Paper
Ms. Janine Aleong
Research Project: IDentity Theft History
Much before the internet technology had gained popularity, identity theft was common in form of dumpster diving and going through your trash in case you have thrown away any personal identifying information such as bills or documents. But before that, identity theft was known as a white collar crime and it was pretty dangerous.
This means that if the id thieves wanted to steal your identity they would just kill you for it and just assume you identity and walk away. Back in those days the thieves also used phone scams to gather information about you. For example
1118 words - 5 pages
You pay all of your bills on time, when you use your credit card you pay the balance off when you are supposed to; even more than the minimum payments, and then when you try and go buy a car or a house you are declined due to bad credit. Ever wonder how that can be? Well you might have been a victim of identity theft. What is identity theft you ask? It is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. According to the national association of the attorneys general,
“Identity theft is one of the fastest
1002 words - 5 pages
This paper discusses identity theft in terms of its impact, its character and its prevention. In the paper, particular attention is given to the types of primary identity theft classifications, some online methodologies of identity theft and finally, some preventive measures. The paper discusses how identity theft is found to be a massive problem in terms of financial losses to both corporations and individuals and is expected to grow in severity over the next few years.
From the Paper
"Identity theft occurs when an unauthorized person obtains another's name and a piece of critical identifying information about that person such as a credit card or bank account number, social
879 words - 4 pages
How are identity thieves operating to get your identity and what can they do with it?
First it is important to know what identity theft is and then understand the way thieves manage to steal your identity. It’s a crime that happens when “someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain.” (Identity Theft, The United States Department of Justice), in other words: when someone uses other one’s identity to take advantage of it without any liability on his or her name. On the other hand there are various ways in which people can access to your valuable information, sometimes they are simple techniques
1476 words - 6 pages
According to the U.S. Department of Justice, an estimated 11.7 million Americans were victims of identity theft in 2010 (U.S. Dept. of Justice). Identity theft is defined as a crime where someone illegally acquires and utilizes another person’s vital information to deceive for personal gain. That same year, the Federal Trade Commission reported that identity theft crimes cost businesses and individuals an estimated $53 billion (Federal Trade Commission). Most Americans are familiar with identity theft but aren’t well-informed about the influence it has on the economy in addition to individuals. They are not knowledgeable about the laws that are meant to protect consumers and are not mindful
587 words - 3 pages
Identity theft surrounds us every day. from people stealing other people’s info and using it to gain credit or just to get out of trouble .identity theft can be as easy as just using someone’s name to using their whole identity, like name social security numbers .
Anyone can go online if they have this information and apply for any type of credit which would assume your identity. Many creditors are hard to go through to prove that it wasn’t you. They will require many documents to prove the fact. People don’t even have to be online to steal your identity they can do it by copying your credit card information at your local restaurant to the local deli.
In short it shows
565 words - 3 pages
? Why or why not?
Ethics are relative to one’s culture and societal norms. Therefore, when the members of the Computer Ethics Institute created the Ten Commandments of Computer Ethics, they did so based on what they felt was the right thing, morally (White, n.d.). Based on that thinking, I believe that it is ethical to tap online ervice providers and read emails to stop or prevent hackers from preventing illegal activities.
4. Do you think it was ethical for authorities to use one of the high-ranking officials to trap other gang members? Why or why not?
5. In a team, research the Internet and find the best ways to protect yourself from identity theft.
If you look up “identity theft
670 words - 3 pages
Privacy in the 21st Century
20 May, 2013
I. Introduction: In today’s world with the identity theft and fraudulent accounts being created on a daily basis, a person might ask there self if privacy in the 21st century might be possible. People put their privacy in jeopardy
1347 words - 6 pages
nation including scams that can make a rich individual poor and even possibly make an average, well credited and intellectual person become a criminal that is credit less or maybe even bankrupt and in debt. There are different types of identity theft frauds, some common ones are phone or utilities fraud, credit card fraud, government documents or benefits fraud, bank fraud, employment-related fraud and loan frauds. Hackers are able to make these things happen in real life to real people with a click of a button on their highly secured computer keyboards through identity theft. In 2002 there were 8,863 victims of identity theft in New York City alone (1)
As intimidating as this might
1127 words - 5 pages
a fake that is weak or nothing at all. Other examples of online identity theft are government leaks, social networks, and computer hacking.
People need to know about some of the precautions that help prevent people from giving out personal information when they do not need to. Passwords are important way to protect peoples’ information over the Internet and are an essential. They provide access to accounts on different sites and allow the site a way to verify that the person is who they say they are. However, there are many techniques that can be performed to hack a password. Although, there are also counter measures that can be done to make passwords better, like changing passwords every
1630 words - 7 pages
The Threat of Fraud
American InterContinental University
Security and Loss Prevention
March 28, 2013
Identity theft, whether on a personal or business level is a criminal act. So, for many years individuals have plotted and schemed to come up with scams to obtain personal information from other individuals or organization to either sabotage one’s reputation or obtain financial gain. Either way, this wave of criminal activity is wreaking havoc to innocent people and successful organizations everywhere.
The Threat of Fraud
Corporate fraud and executive identity theft are crimes that are on the rise. I don’t
446 words - 2 pages
Committee. The agency seems to focus on individual medical centers in fixing identified problems, instead of fixing those problems agency wide. Despite of all this mistakes the VA had been very fortunate that the stolen laptop computer and hard drive were turned in by unidentified person on June 29, 2006 and there’s no indication the stolen information has been used in identity theft schemes.
This kind of dilemma could be prevented if the VA agency did not ignore all the warnings given by the auditor in terms of cyber security audits. All they can do now is to prevent this incident to occur once again. They need to make sure that their sensitive data’s information is out of reach to
1301 words - 6 pages
and why do people commit them? How much money is at stake, lost and recovered? How can such crime be reduced – by prevention or punishment? Online and desk-based reviews of books, reports and articles Legislative and case-law analysis, including sentencing research Consultations with business, government and the community Surveys of households, businesses, offenders and victims Analysis of media reporting of crime
Dissemination of findings
• Reports, books, articles, conference papers, roundtables, online, media
Cyber crime concepts
Identity Crime Cyber Crime
e.g. off-line crimes e.g. ID theft
838 words - 4 pages
For 22 years, John Doe assumed the identity of a man whose wallet was stolen from his
car in 1989. This form of identity theft will change over time to evolve to possibly affect
any one who accesses the World Wide Web. Even though crime exists in the real world
equally as it is online, The Internet is solely responsible for most of the Identity theft
Crime exists in the real world equally as it is online. As much as we hate crime it is
something that we have to live with. It is a constant battle that we must fight against all
types of different criminal threats. Now with technology advancing so rapidly, crime has
found a new home. This new home is
1666 words - 7 pages
include: writing company checks, money laundering, processing fraudulent invoices, payroll fraud, falsifying revenue reports, customer identity theft, intellectual property theft, overstated expense reports and credit card fraud (Bressler, 2011). Long before credit card fraud and identity theft, business owners dealt with theft. There is a no more clear example of this than by the commandment “You shall not steal” (Exodus 20:15 New International Version).
Employee theft from a business can take many forms. In the fictitious examples above, Mr. Smith stole office supplies. While taking a few supplies here and there may not seem like such a big deal consider this, a 2007 report showed
985 words - 4 pages
cons of social networking sites. One of the cons of social networking sites is that it makes identity theft easier. Furthermore, scammers also use social networking sites to trick people into downloading malicious software. Finally, social networking can be both overwhelming and addictive at the same time.
Among the pros and cons of social networking sites stated by Strickland, I agree with one of the pros saying that social networking sites allow users to make connection with other people. Social networking sites are easy and effortless way to communicate with friends and family when we are unable to get in touch due to time and distance constraints. Based on my prior experienced
1210 words - 5 pages
imprisonment as aggravated false imprisonment because of the use of bodily force as well as threats, which prelude to the act itself (Schmalleger, 2010).
Theft consists of many criminal offenses including larceny, identity theft, robbery, and burglary. According to (Schmalleger, 2010, p. 254) “Crimes of theft are sometimes called acquisitive offenses, wrongful acquisition crimes, or crimes of misappropriation since they involve the unlawful acquisition or appropriation of someone else’s property.”
In today’s society larceny is understood as the trespassing or unjust taking away of another`s personal property or belonging`s without his or her consent. Only tangible property is subject to
1795 words - 8 pages
Dr. Holly Elliott
2 December 2015
In today’s society crime is increasing every day and the types of crime are changing. It seems more and more that crimes of identity theft and organized crime are on the rise. I am writing this to let you know more about crime and theft rates. One of the most difficult problems of our society is robbery. Robbery can occur almost anywhere at anytime, especially on the streets. Many states define robbery as theft accomplished by violence or the threat of violence. Guns are the most deadly weapons that can be used by the thief, which can cause the victim to suffer and injuries. Some thieves even kill the
683 words - 3 pages
Credit Protection Worksheet
FP/101-Foundations of Personal Finance
Credit Protection and Identity Theft
Free Credit Report on the Federal Trade Commission’s site.
Identity Theft resource center on the Federal Trade Commission’s site.
Provide answers to three of the following questions based on your readings and your personal experiences. Answers should be 100-to 150-words each.
1. If you find errors on your credit report, what steps would you take to correct them?
You’d tell the credit reporting company, in writing, what information that you found that’s inaccurate on your credit report. The agency must investigate the items
1891 words - 8 pages
$40 billion in losses to telemarketing fraud (COPS Office. n.d.).
Another big problem why senior citizens are being targeted, because what con artists get from identity theft. Identity theft is a worldwide problem. Law enforcement as well as identity theft specialists has identified senior citizens in retirement communities, nursing homes and senior living facilities as prime targets for identity theft and larger scale schemes to obtain social security numbers for the purpose of opening lines of credit. Twenty eight percent of all identity theft is committed against people over the age of fifty. The main reason senior citizens are at such high risk in comparison to other segments of the
1079 words - 5 pages
decision to steal is spontaneous and whose acts are unskilled unplanned and haphazard. Millions of thefts occur each year, and most are not reported to police agencies. Many of these theft offences are committed by school-age youths who are unlikely to enter criminal careers and who drift between conventional and criminal behavior. Added to the pool of amateur thieves are the millions of adults whose behavior may occasionally violates the law, shoplifters, pilfers, tax cheats, but whose main source of income is conventional and whose self-identity is noncriminal. Added together, their behaviors form the bulk of theft crimes.
Occasional property crime occurs when there is an opportunity, or
748 words - 3 pages
Joseph Wellington a certified fraud examiner has requested help in reviewing cases that involve identity theft of University Professors. A Certified fraud examiner is one that investigates possible illegal activity. He or She will review and analyze documentation and interviews of suspects and help to work out the facts and details of a fraud claim. Along with this they will help to set up training and guidelines for employers and employees to prevent fraud. They receive their training and certification by the Association of Certified Fraud Examiners. This is one of the largest organizations that is anti-fraud and provides education. (ACFE Association of Certified Examiners, 2013) Identity
625 words - 3 pages
. Someone could read when popular or valuable websites’ hosting expires, then squat on it hoping to scoop up the domain/hosting then sell it back to the owner at a profit.
5. A city government that allows people with parking tickets to pay the fines online using a credit card or online check.
e. Financial fraud or identity theft; customer information could be compromised including personal payment information. False payments could be made online.
6. A local residential-cleaning business with a website that acts as a company brochure; no forms of any type are located on the website.
f. This has no web application currently, which cause a loss of potentially new clients
436 words - 2 pages
concern even among sophisticated users. (Respondents 3 and 137) The big concern is the lack of security with the customers receiving phishing-type emails from hackers which can lead to identity theft. There is also a concern to small businesses that they do not have a big enough protection policy when it comes to identity theft/hackers.
The existing user base is happy with the convenience and the quality of service. Based on the surveys, the respondents believe FIR is simple and easy to use when viewing and paying bills.
2. What customer segments are targeted by FIR? On what issues should FIR focus in order to build relationships with its varied customer segments?
606 words - 3 pages
CIA of information within their information system. A lack of administrative controls suggests that management is negligent in understanding its responsibility to protect the information system usually contributing to theft, loss, or aid of a crime.
How does the absence of Administrative Controls impact corporate liability?
I feel that the absence of Administrative Controls would have a negative impact on corporate liability. If an organization handles Personal Identity Information (PII), whether personal, financial, or medical, they are legally responsible for the safe keeping of this information. Not having administrative controls in place to safeguard this information, an organization
2285 words - 10 pages
Categories of Computer Crimes
CIS 170 – Information Technology in Criminal Justice
Dr. Nicole L. Gray
Marilyn T. Hawkins
October 16, 2012
Computer Crimes are criminal activities, which involve the use of information technology to gain an illegal or an unsanctioned access to a computer system with volition of damaging, deleting or alter computer data. Computer crimes also include the activities such as electronic frauds, misuse of devices, identity theft and data as well as system intrusion. Computer crimes may not necessarily encompass damage to physical property. They rather encompass the control of confidential data and critical information. Computer crimes involve activities
669 words - 3 pages
can be publically viewed by anyone and everyone. Pictures, videos, and personal information continually get posted even with privacy statements.(Gail, Uy K 2010).All while people think they are safe from having certain people view their profiles, there is always a way to view your personal sites. The danger of having your information put out there for the world to see is the possibility of becoming a victim of identity theft. Along with identify theft; there is the possibility of fake profiling and bullying.
Building of fake profiles in the social network community is something that is easy for anyone that is trying or wanting to bully someone without having to do it in person. This is
1597 words - 7 pages
to perform and much worst it creates unnecessary troubles for teenagers as they are the ones who are extremely active on social media.
Faking identity is a serious crime offence in all the countries. Sometime back in 2011, local United States online mail (Stevens, 2011) reported news of a 41-year-old woman who created a fake Facebook profile of her ex-boyfriend who is a narcotics detective. The women posted some personal information, photos and several false posts involving his lifestyle and career in the Facebook profile. She intended a prank to get back to her ex-boyfriend but was charged for identity theft and ended up in prison for 18 months and paid $2000 pounds as a fine
1896 words - 8 pages
psychosocial approach of identity claims that identity development is achieved through the influence of both personal and social factors.
SIT defended that Identity is achievable through social events in our young life which results in gradually building of our identity.
Part 2 Ethics question
Read the following vignette and then answer the questions below.
A university researcher is interested in exploring whether or not children aged 8–10 make reliable eyewitnesses. To do this, the researcher plans to go into local schools and carry out a simple eyewitness task in the classroom. This involves showing children a video of a petit-theft, and
947 words - 4 pages
May 1, 2016
Blue Collar crime
Blue collar crime is considered as a lower class which crimes harms the victim and requires the criminal to be present at the scene of a crime. Blue collar crime causes bodily harm or direct damage and is done directly to the victim. Examples would be Robbery, Rape, Murder, Theft and Assault.
White Collar Crime
White collar crime does not directly harm the victim and does not require the criminal to be present at the scene of the crime and is a higher class crime. Examples would be Fraud, Embezzlement, Identity Theft, and Income tax evasion.
Criminalists have an important part in the justice
4003 words - 17 pages
buying, selling, and exchanges more convenient with a heightened interactive experience. Some of these developments include online and mobile banking, online shopping, the ability to provide government services online, and the ability to make payments and purchases using a mobile device. These are all useful applications that many of us use every day, but the level of convenience does have a cost. Security and privacy issues have been a long standing topic in E-commerce. The controversy has been between adding more ease of use and better experience to the customer or add more security to make the customer feel more secure in using the system. Identity theft, denial-of-service attacks
1037 words - 5 pages
-human objects, humiliation or the experience of receiving or giving pain or children or others who cannot gran consent.
Frotteurism- rubbing against or touching a no consent person in crowd, elevator or other public area
Voyeurism- obtaining sexual pleasure from spying on a stranger while he or she disrobes or engages in sexual behavior with another.
Chapter 15 (Question # 4)
Identity theft occurs when a person uses the Internet to steal someone’s identity and/or impersonate the victim to open a new credit card account or conduct some other financial transaction. It is the type of cyber crime that has grown at surprising rates over the past few years. Identity
1317 words - 6 pages
companies and major banks have started to offer the EMV "chip and pin" cards, that have a four digit pin and generate a one time security code. The EMV cards are widely used in the U.K. and seem to have better success in warding off hackers than regular magnetic stripe cards with physical purchases. Online purchases with the EMV card do not ask for the pin and one time security code, leaving the customer open to an identity attack. It is much more difficult to manufacture a microchip than a magnetic stripe on a credit card. However, in the world of identity theft, where there is a will, there is a way.
Dustin Pellegrini from IdentityProtection.com stated, "Fraudsters have begun to
1857 words - 8 pages
intends to learn more by using one’s computer. Information Technology Act 2000 doesn’t make hacking per se an offence. Crackers on other hand use the information cause disruption to the network for personal and political motives. Hacking by an insider or an employee is quite prominent in present date. Section 66 (b) of the Information Technology Act 2000, provides punishment of imprisonment for the term of 3 years and fine which may extent to two lakhs rupees, or with both.
Following are the common types of attack by hackers/crackers:
• Identity theft, also known as phishing, is one of the fastest growing epidemics in electronic fraud in the world. Identity theft
1564 words - 7 pages
Personally Identifiable Information (PII) and Data Breaches
By Stevie D. Diggs
University Maryland University College
IFSM201 Section 7974 Semester 1309
Personally Identifiable Information (PII) and Data Breaches
Knowing and training on personally identifiable information (PII) is important in today’s society. There has been research on data breaches and identity theft that links them both together. This is to help personnel have a clear understanding on the impact of what is at steak and an explanation of PII. Many businesses and organizations have different definition for PII because of the classification of data for each, and that is why understanding PII is important. Examples of
1475 words - 6 pages
, businesses have to weigh the risks of hacks. When an individual allows their information to be stored in a database, with or without their knowledge they are at risk. When this information enters the database, it becomes the business's responsibility to protect this information. With the amount of sensitive data being stored in databases, current cyber security measures and laws are not up to par.
Infamous Data Breaches
In 2015, there were 781 data breaches according to the Identity Theft Resource Center (ITRC). One of these infamous breaches being with Anthem, otherwise known as BlueCross BlueShield insurance company. In this breach, hackers stole over 80 million social security numbers
908 words - 4 pages
hacker then will use this information that is gathered to either launch attack against the network, build fake profiles for identity theft, or sell the information to people who want to attack the network or launch identity theft on the person. In this case the phishing that was launch gave access to the state department computers and white house computers.
The white house in response to the attack shut down their system that was affected and also shut down the state departments systems that was effected while they removed the malware that was in their system and upgraded their security of the current system to prevent phishing attacks from happening again.
Though that will not be enough to
542 words - 3 pages
Preventing Security Breaches
There have been many large security breaches in the past few years, including such huge corporations as JP Morgan, Home Depot and Target. According to a report published by Ponemon Institute in September of 2014, almost half of all U.S. companies experienced a security breach of some kind in the past year. On top of that, an Identity Theft Resource Center report found more security attacks in the U.S. in 2014 than in any previous year. What can be done to prevent the release of potentially sensitive information? There are several precautions that can make a big difference when it comes to security breaches. Three of the most important are keeping software up
687 words - 3 pages
March 28, 2007
The most interesting topic of the Internet is the loss of privacy. It is unbelievable the amount of people who are willing to give out their personal information to un-secure web-sites. Most people donâ€™t realize the risk in Internet use. When a site is asking for your social security number, you want to make sure that this site is secure or else you are putting yourself at risk for identity theft or fraud. When contributing to a greater cause, you want to make sure that your money or contribution is going where is should be. Internet scams is an increasing concern amongst Internet users. Another serious topic about Internet use is the
964 words - 4 pages
functions. However, if sensitive information gets into the wrong people, there is every tendency that it can lead to fraud, or identity theft. The cost of defending a security breach is alarming. Gaining the trust of customers and prospective customer may be a very difficult task. Some companies may have a division in the organization that takes care of protecting PII. Others businesses hire an outside contractor in safeguarding their sensitive information.
A comprehensive data security plan consists of five major principles which are:
Stock Taking: This is getting all PII that companies have, both hard copy files and soft copy files. Record of all devices like computers, laptops, copiers, etc